Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50...
Transcript of Publisher Company, Tinley · TableofContents 9 Repeater 48 Hub 48 Gateway 48 Bridge 49 Switch 50...
Publisher
The Goodheart-Willcox Company, Inc.
Tinley Park, Illinois
www.g-w.com
#
Chapter 1
Introduction to Networking 25
Definition of a Network 27
Advantages of Networking 28
Disadvantages of Networking 29
Network Classifications—LAN, MAN, and WAN 29
Network Topologies 30
Bus Topology 31
Star Topology 32
Ring Topology 32
Mesh Topology 33
Wireless Topology 34
Hybrid Topology 35
Basic Administration Network Models 36
Client/Server Network 37
Peer-to-Peer Network 38
Network Operating Systems (NOS) 39
Network Communications 40
How Data Is Packaged 40
Network Connectivity 40
Protocols 41
TCP/IP 42
FIR 43
ATM 43
LLDP 43
NetBIOS and NetBEUI 45
Network Media and Devices 46
Media 46
Media Converter 46
Network Interface Card 46
8
Table of Contents 9
Repeater 48
Hub 48
Gateway 48
Bridge 49
Switch 50
Multilayer Switch 51
Router 51
Brouter 52
Standards and Organizations 52
IEEE 53
ISO 54
W3C 54
CERN 55
UL 55
EIA 55
TIA 55
ANSI 55
OSI Model 55
Physical Layer 56
Data Link Layer 56
Network Layer 56
Transport Layer 57
Session Layer 57
Presentation Layer 57
Application Layer 57
OSI Model and Network Devices 57
Laboratory Activity—Identifying a Workstation's IP ConfigurationSettings 63
Chapter 2iiiiiinNetwork Media—Copper Core Cable 67
Network Media 69 WfRBKRKBR^RRtBAnalog and Digital Signals 69 HHHHBBHH
Frequency 70 BBBBBBBBfAttenuation 71 T^l^wHMMipBpInterference 71
ff- '"^L'^-^^BLatency 72 HHHHBflHHH
Data Transmission 73 ""'v* "^P^ipiBandwidth 73 |pBBMpBB|pBaseband 73 HHHHHHflHBroadband 74 HHHHHISimplex, Full-Duplex, and Half-Duplex Communication 75
Electronic Terms 76
Direct Current and Alternating Current 76
10 Networking Fundamentals
Resistance and Impedance •-76
Reflected Loss 76
Crosstalk 76
Copper Core Cables 79
Coaxial Cable 81
TwistedPair 84
IEEE 802.3 Standard 88
IEEE 802.3 Classifications 88
IEEE 802.3 Media Access 95
IEEE 802.3 Wiring and Connections 95
IEEE 802.5 Standard 100
Wiring Faults 102
Short 102
Open 102
Ground 103
Reversed, Crossed, and Split Pairs 104
Laboratory Activity—Making a Cat 6 Straight-Through Patch Cable Ill
Chapter 3iiiniii
Fiber-Optic Cable ...119
Characteristics of Fiber-Optic Cable 120
Security 121
Immunity to Electromagnetic Interference 121
Weight and Size 122
Safety 122
Bandwidth 122
Corrosion and Water Resistance 122
Greater Distances 122
The Nature of Light 123
Fiber-Optic Cable Construction 124
Fiber-Optic Cable Transmission Characteristics 125
Attenuation 125
Fiber-Optic Cable Specifications 128
IEEE 802.3 Standards 129
Gigabit Ethernet 130
10 Gigabit Ethernet 130
lOGBaseW 131
Fiber Distributed Data Interface (FDDI) 132
Fiber-Optic Cable Connectors 134
Fiber-Optic Cable Installation and Troubleshooting 134
Installing Connectors 135
Making a Fusion Splice 135
Using Fiber-Optic Cable Meters 137
Laboratory Activity—Fiber-Optic Connector Identification 145
Table of Contents 11
Chapter 4
Wireless Technology 147
Electromagnetic Waves 149
Radio and Microwave Transmission 149
Infrared Transmission 151
Radio Interference 152
Antenna Styles 154
Omni 154
Dipole 155
Yagi 155
Flat Panel 156
Parabolic 156
Radio Wave Transmission Techniques and Networking 157
Radio Wave-Based Transmission Techniques 157
Radio Wave-Based Networking 160
Wireless Access Points 160
Wireless Network Modes 162
IEEE 802.11 Standard 163
802.11 Access Method 166
New IEEE Wireless Standards 170
USB Wireless 172
Bluetooth 172
Cellular Technology 173
Microwave Transmission and Networking 174
Infrared Transmission and Networking 176
Advantages and Disadvantages of Wireless Technology 176
Wireless Security 176
802.1X Authentication 177
802.1X Encryption 178
Wi-Fi Protected Access 181
Laboratory Activity—Installing a USB Network Adapter and
Configuring a Wireless Router 187
Chapter Siiiiini
Digital Encoding and Data Transmission 199
Digital Signals and Digital Encoding 200
Data Packaging and Transmission 203
Parity Checks 203
Cyclic Redundancy Check (CRC) 204
Segmentation and Encapsulation 204
Connection-Oriented and Connectionless Communication 206
Circuit Switching/Packet Switching 207
Data Codes 208
ASCII 208
ffl*»a-
VM^y^i^&t^iSS^^S
B»-
*~
12 Networking Fundamentals
BCD 210
EBCDIC 210
Unicode 210
HTML 211
Protocol Frame Structures 212
UDP Frame Structure 214
Ethernet Frame Structure 215
Data Encoding, Transmission, and the OSI Model 217
Application Layer 218
Presentation Layer 218
Session Layer 218
Transport Layer 219
Network Layer 219
Data Link Layer 221
Physical Layer 221
Laboratory Activity—Introduction to Wireshark 227
HofiwAii)^
Cwmtf m*ij.
: ijjf V^IK^-2Q^>h»rtCi>nwMn
*ta Miwuam t* (urn
Sal
61 ^CMfct Moth*
H Mv*ulKH*~t*nvO*t*MMlMTttMitMJt,H S*** Mmri IW"Bta
Vi *.H*r*Piele«4V»vnfrTCMPTS)H ^hMH>nMM<slVn«>([lC^<)
K L.ltk\tftt Tspatcjy tatmrj Mhk Cnkm
ii >•'Irttiiy.. TafKfajf pnarfj knpcntv
tZjSSa^ !';"---^.
J L.j'*?^CtM«>Mn
C_aC][.fS
w*l^^^^^^^^s^f-S^jj^i
Chapter 611111111
Network Operating Systems and
Network Communications 237
The Evolution of Network Protocols 238
Common Network Operating System Traits 239
Network Operating Systems and Hardware Protocols 242
Ethernet 244
Token Ring 247
Token Bus 249
ARCnet 249
AppleTalk 250
Network Operating Systems and Networking Protocols 250
TCP/IP 252
NetBIOS 254
NetBEUI 256
IPX/SPX 257
AppleTalk 258
Discovery Protocols 259
Laboratory Activity—Using the ARP Command 267
Chapter 7
Microsoft Network Operating Systems 271
A Brief History of Microsoft Network Operating Systems 273
Windows Server 2008 275
Windows Server 2008 Editions 275
Windows Server 2008 Features 277
Small Business Server 2008 280
Table of Contents 13
CommonWindows Server Administrative Components 280
Domain, Workgroup, and HomeGroup Membership 281
User Account 282
Group Account 282
Security Policy 283
Network Share 283
File Sharing Protocols 285
Disk Management 286
New Technology File System 286
Share- and User-Level Permissions 288
Administrative Tools 291
Active Directory Domain Services 292
Active Directory Structure 293
Common Name 298
Authentication 298
AD Replication 299
Trusts Relationships 300
Windows Server Administration 302
Microsoft Management Console 302
Managing Local Users and Groups 302
Managing Domain Users and Groups 305
Windows Disk Management 307
POSIX 310
Network Interoperability 310
Laboratory Activity—Adding Users to Windows Server 2008 315
Chapter 8iiiuiiiUNIX/Linux Operating Systems 323
UNIX 325
Linux 326
Linux Advantages 328
Linux Disadvantages 328
Copyright and Copyleft 328
UNIX/Linux Basics 330
LILO and GRUB 330
Shells 330
Commands 332
File Systems 334
File Structure 335
Common Files and Directories 336
File and Directory Security 337
Network Authentication 339
File and Print Sharing 339
Remote Access Features 339
14 Networking Fundamentals
X Windows System 341
Interoperability 344
Samba 344
NFS 346
Troubleshooting interperability 349
Mac OS X Server 350
Laboratory Activity—Installing openSUSE 11 Linux 355
Chapter 9iiiiiin
Introduction to the Server 369
^l^l^^lllS^Server Classification by Number of CPUs 372
Major Server Components 372
Small Computer Systems Interface (SCSI) 377
SCSI ID numbers 378
Logical unit number (LUN) 379
Serial Attached SCSI 379
ACPI and ACPICA 380
System Resources 381
Interrupt Request (IRQ) 381
Direct Memory Access (DMA) Channel 382
Input/Output (I/O) Port 383
Memory Address Assignment 384
RAID Systems 384
RAID 0 386
RAID 1 386
RAID 2 387
RAID 3 387
RAID 4 387
RAIDS 387
RAID 0/1 388
RAID 0/5 388
RAID 6 388
External Storage Systems 388
Network-Attached Storage (NAS) 388
Storage Area Network (SAN) 388
Fibre Channel 390
Fibre Channel Point-to-Point Topology 390
Fibre Channel Arbitrated Loop Topology 390
Fibre Channel Fabric Switched Topology 391
Internet Small Computer Systems Interface 391
Furthering Your Study 393
Laboratory Activity—Using the DiskPart Command Interpreter 399
Table of Contents 15
Chapter 10
TCP/IP Fundamentals 403
IPv4 Addressing 405
Network Class 406
Subnet Mask 407
Reserved IPv4 Addresses 407
Viewing IP Configuration Settings 409
Domain Name System (DNS) 410
Internet Corporation for Assigned Names and Numbers (ICANN) —411
Fully Qualified DomainName (FQDN) 411
DNS Structure and Operation 412
Hosts and Lmhosts Text Files 415
IP, TCP, and UDP Protocols 416
Relationship to the OSI Model 416
Frame Formats 417
Assigning IP Addresses 419
Windows Internet Naming Service (WINS) 419
Dynamic Host Configuration Protocol (DHCP) 420
DHCP Lease 422
Automatic Private IP Addressing (APIPA) 422
Bootstrap Protocol (BOOTP) 423
Duplicate IPv4 Addresses 423
TCP/IP Ports and Sockets 424
Introducing the IPv6 Standard 425
Advantages of IPv6 426
IPv6 Address Format 427
IPv6 EUI-64 Identifier 427
IPv6 Topography Terminology 429
Types of IPv6 Addresses 431
Unicast Addresses 431
IPv6 Loopback Address 433
IPv6 Unspecified Address 433
Local-Use Address Zone IDs 433
IPv6 Prefixes 433
IPv6 Transition Technologies 434
6to4 435
ISATAP 435
Teredo 435
Broadcast and Multicast Addresses 436
IPv6 Lifetimes 436
Windows XP and IPv6 436
Disabling IPv6 437
TCP/IP Troubleshooting Utilities 437
Netstat 437
16 Networking Fundamentals
-S^*y&Mis£i&itL
MP SubnetOicubtor
itSHrm .'tr'u-.t,
iwwwr |WWUn***l M1
**»,,
lllMHMit
$^&^V-T**~^
TwU,^:"
ilEWsili l^ifiSW^i j-
HM.«W"Itt)vCO~MOwKnM4wiMlt•Wflwiili fnW
CsCK
Nbtstat 438
Ping 439
Tracert or Traceroute 440
ARP 440
Nslookup 441
Laboratory Activity—Configuring a Static IPv6 Address 447
Chapter 11
Subnetting 451
The Binary Number System 453
Dotted Decimal Notation 453
Subnetting 454
A Closer Look at Subnets 458
Advantages of Subnetting 459
Disadvantages of Subnetting 460
Network Segmenting Devices 460
Bridge 460
Switch 461
Router 464
Virtual LAN 469
Static vs. Dynamic VLAN 471
VLAN Trunking 471
Spanning Tree Protocol 473
Classless Inter-Domain Routing 474
Link Aggregation 476
Laboratory Activity—Subnet Mask Calculator 481
Chapter 12
Multimedia Transmission 487
Voice and Audio Signals 489
Signal Conversion 489
Jitter 492
Latency 493
Acoustical Echo 494
Video 495
Video Resolution 495
Compression 495
Multimedia Transmission Protocols 497
X.25. .497
Frame Relay 498
ATM 498
.504VoIP
Telephone Gateway and H.323 507
Quality of Service (QoS) 507
Table of Contents 17
Session Initiation Protocol (SIP)Real-Time Transport Protocol (RTP)
Basic VoIP Troubleshooting
Using a Protocol Analyzer to Verify Packet ExchangeVoIP JitterFirewall Blocking VoIP Packets
Audio Device Configuration
Impedance Mismatch
Laboratory Activity—Windows Meeting Space
Chapter 13
Web Servers and Services
Internet, Intranet, and Extranet
Internet
Intranet
Extranet
Domain Name and URL Resolution
Web Servers
Apache HTTP Server 531
Internet Information Services (IIS) 532
Web Browsers 533
Search Engines 533
Web Site Communications 535
HTML 535
SGML 536
XML 536
CSS 536
JavaScript 537
SOAP 538
FrontPage Extensions 538
File Transfer Protocol (FTP) 538
Anonymous FTP Site 540
Network News Transfer Protocol (NNTP) 540
E-Mail 542
SMTP 542
Post Office Protocol (POP) 544
Internet Message Access Protocol (IMAP) 544
HTTP E-Mail 544
Multipurpose Internet Mail Extensions (MIME) 545
E-Mail Address Format 545
E-Mail Structure 546
Mail Filter 546
Mail Gateway 548
Laboratory Activity—Installing Internet Information Services (IIS) 553
..508
..509
..509
..510
..510
..511
..511
..513
..517
525
..526
.
.526
.
.527
.
.527
.
.527
..529
f;
mWirntowj(«IuiHO(
:ia WuchiW«m»»BS»r-HtiHtnriM*ftbt*n
i itk titomeft Jit! illMtrrt* }>i
i tJii t-SfretpIlMnwJ<CMV«limO) "rrn*t
b Mil Print ml OhumM Imkii
:'_,}. WKowfWwMinij«»Art>nqUti»*«eCMAM
CjsQ CesiD
18 Networking Fundamentals
A lECt B0,1**ilhttifa4Mn CMftM6p6tiMonpMlMJJJ^ p*M[ril^nBtinD^MtnMlw«rkikiinlichd*U
cncqpttwiidubM,
| QK )1 C*nc«t |
Chapter 14
Remote Access and Long-Distance Communications... 561
Introduction to Telecommunications Systems 562
Remote Connection Technologies and Media 564
Public Switched Telephone Network (PSTN) 565
ISDN 565
Cable Internet Service 566
Digital Subscriber Line (DSL) 568
Satellite 569
T-Carrier 571
FDDI 572
SONET 572
X.25 573
Frame Relay 573
Dial-Up Networking 574
Dial-In Only 575
Dial-Out Only 576
Full Service 576
Remote Desktop Protocol (RDP) 576
Remote Access Protocols 577
Virtual Private Networks (VPN) 581
Laboratory Activity—Routing and Remote Access Service (RRAS) 587
Chapter 15
Network Security 597
Hackers, Crackers, and Intruders 599
CommonNetwork Security Breaches 599
Unprotected Network Shares 600
Social Engineering 600
Open Ports 600
Zero Configuration (Zeroconf) 601
Denial of Service (DoS) 601
Man in the Middle (MITM) 601
Spoofing 602
Smurf Attack 602
Trojan Horse 603
E-mail Attachments 603
Macro Virus 603
Worm 603
Phishing 604
Administrator Laziness 605
Intrusion Detection and Intrusion Prevention Systems 605
Security Methods and Protocols 606
Table of Contents 19
Public Key Infrastructure (PKI) 606
Certificate Authority (CA) 608
Security Sockets Layer (SSL) 610
Transport Layer Security (TLS) 610
Secure HTTP 611
Virtual Network Connection (VNC) 611
Independent Computer Architecture (ICA) 611
Internet Protocol Security (IPSec) 611
Secure Shell (SSH) 612
Secure Copy Protocol (SCP) 613
Wireless Security 613
Wireless Access Point Authentication 613
Media Access Control (MAC) Filter 614
Wired Equivalency Privacy (WEP) 614
Wi-Fi Protected Access (WPA) 614
Wi-Fi Protected Access 2 (WPA2) 614
802.11i 614
802.1x Authentication 615
Rogue Wireless Access Points 617
Authentication, Authorization, and Accounting 618
RADIUS 619
Diameter 619
TACACS+ 620
Authentication Protocols 621
Password Authentication Protocol (PAP) 621
Challenge Handshake Authentication Protocol (CHAP) 621
Kerberos 622
Extensible Authentication Protocol (EAP) 623
Wi-Fi Protected Access (WPA) 623
Security Implementations 623
Software Installation Patches 624
Administrator Account 624
User Account Passwords 625
Other Password Security Measures 627
Firewall 627
Proxy Server 631
Securing Remote Access 631
Physical Security 632
Security Tools 633
Netstat Utility 634
Audit Tools 634
Self-Hack Tools 635
Protocol Analyzer 635
Packet Sniffer 636
20 Networking Fundamentals
System Backups 637
Data Security Compliance Requirements 637
Health Insurance Portability and Accountability Act 638
Payment Card Industry Data Security Standard 638
California SB 1386 638
Sarbanes-Oxley 639
Laboratory Activity—Security Event Monitoring 644
Chapter 16
A Closer Look at the OSI Model 649
pSS^i History and Purpose of the OSI Model 650
Application Layer 654
fi£.„T..,„ Presentation Layer 654
imawiwrn Session Layer 655k^=to—_:—=—
Transport Layer 656
Network Layer 657
Data Link Layer 659
Physical Layer 660
The Encapsulation Process 661
The OSI Model and the Major Protocol Suites 663
TCP/IP Protocols 663
Novell IPX/SPX Protocols 663
AppleTalk Protocols 665
AppleShare IP Protocols 666
Request For Comments (RFC) 666
Laboratory Activity—Wireshark OSI Model Exploration 671
Chapter 17
Maintaining the Network 675ST— —_ q Monitoring the Server and Network 677
I 111MM Establishing a Baseline 677
L :r EE" "
:, Monitoring Tools 681~ ~
nsr"~ , v n.,,°
!|ss | I Maintaining System Software 686
—•'
Patches 686B~,, ....
: ij
Service Packs 686
Upgrades 686
Software Installations 687
Maintaining System Hardware 688
Scheduling Downtime 690
Major Network Hardware Upgrades 690
Maintaining System Integrity 691
Fault Tolerant RAID Systems 691
Backup Data Methods 692
Table of Contents 21
Hot and Cold Spares 694
Hot, Cold, and Warm Sites 695
Maintaining Stable Electrical Power 696
Electrical Surges and Spikes 696
Brownouts and Blackouts 697
Uninterruptible Power Supply (UPS) 698
Isolation Transformers 700
Generators 701
Protecting Networks from Malware 701
Establishing Network System User Policies 701
Antivirus Software 702
Malware 703
Merging Networks 706
Laboratory Activity—LANguard Network Security Scanner 713
Chapter 18
Fundamentals of Troubleshooting the Network 719
CompTIA Network+ Troubleshooting Methodology 720
1. Information Gathering—Identify Symptoms and Problems 721
2. Identify the Affected Areas of the Network 722
3. Determine if Anything Has Changed 724
4. Establish the Most Probable Cause 724
5. Determine if Escalation Is Necessary 725
6. Create an Action Plan and Solution Identifying Potential Effects...
.726
7. Implement and Test the Solution 726
8. Identify the Results and Effects of the Solution 726
9. Document the Solution and the Entire Process 727
Stages of Computer Operation 728
During the POST 729
Loading and Initializing the Operating System 729
After a Successful Logon 729
Detailed Computer Startup Process 730
1. Power-On Self-Test (POST) 730
2. Initial Startup 732
3. Boot Loader Phase (Windows 2000/XP/Server 2003) 732
4. Detect and Configure Hardware (Windows 2000/XP/Server 2003)... .733
3. Windows Boot Manager (Windows Vista/7/Server 2008) 733
4. Windows Boot Loader (Windows Vista/7/Server 2008) 733
5. Kernel Loading Phase 733
6. Logon Phase 734
Windows NT-Based Troubleshooting Tools 734
System Recovery Strategies and Methods 740
Windows Installation Disc 741
Windows Backup and Restore 743
£ U<«*raQIEF>n#Ciq«l*
WfflfYwi
DgM&rvW>W*f
Tsstwddrii <tal*•*Kn
l**MOwr ~j TturfMtm
"FWi*Qwi~t*kMhiimtou<*i!nuk?d*!
ZZ\ iMitinvV^vu^
CS3uaaj
22 Networking Fundamentals
Windows XP Automated System Recovery (ASR) 743
OEM and Repair Shop Disc Image 744
Troubleshooting Dual-Boot Systems 744
Server Data Integrity and Performance 746
Troubleshooting the Network Infrastructure 746
Windows XP Network Diagnostic Utility 747
Network and Sharing Center 748
Network Cable Tester 750
Tone Generator and Tracer 751
Fiber-Optic Cables 751
NIC Loopback Test 751
Indicator Lights 752
Network Analyzer 752
Protocol Analyzer 752
Wireless Network Tester/Analyzer 753
Troubleshooting the MostCommon Network Problems 753
Cannot LogOn to the Network/Computer 754
Loose or No Connection 755
Cannot Access a Share 756
Cannot Print to Network Printer 756
Printer Is Printing Gibberish 756
Computer Has a Virus or Worm 757
Cannot Obtain a Proper IPv4 Address 757
Cannot Connect to an Application Server 757
Cannot Access VoIP Services 758
Duplex Mismatch 758
Cannot Access the Internet 758
Troubleshooting Common Wireless Problems 759
ESSID Mismatch 760
Signal Bounce 760
Encryption Enabled 760
Troubleshooting with TCP/IP Utilities 760
Ping 760
Pathping 761
Tracert 762
Netstat 764
Nbtstat 765
ARP 767
IPconfig 767
Nsiookup 767
Route 768
Net 768
Laboratory Activity—Using the Netstat Command 776
Table of Contents 23
Chapter 19
Designing and Installing a New Network 781Needs Assessment and Design 783
Physical Network Structure 784
Security 784
Application 784
Organizational Structure 785
Fault Tolerance and Data Integrity 790
Network Design Tools 791
Developing a Timeline 794
Installation 795
Implementation 795
Documentation 796
Training 796
Specifications for Network Design 796
Architectural Design Elements 797
Standards Organizations 804
ANSI/TIA/EIA Standards 804
Network and Computer Electrical Requirements 807
BICSI 810
Laboratory Activity—Designing a Small Network 815
Chapter20
Network* Certification Exam Preparation 819
The Network+ Certification Exam 820
Preparation Strategy 822
1. Review and Analyze the Exam Objectives 823
2. Match Exam Objective Details to Resource Material 823
3. Identify and Practice Laboratory Activities That Match theExam Objectives 825
4. Take Practice Exams 825
5. Review Problem Areas 825
6. Retake Practice Exams 826
7. Schedule and Take the Network+ Certification Exam 826
Networks- Certification Practice Exam 826
Domain 1.0—Network Technologies 826
Domain 1.0—Practice Exam Questions 1-20 827
Domain 2.0—Network Media and Topologies 829
Domain 2.0—Practice Exam Questions 21-40 830
Domain 3.0—Network Devices 832
Domain 3.0—Practice Exam Questions 41-57 832
Domain 4.0—Network Management 834
Domain 4.0—Practice Exam Questions 58-78 835
Domain 5.0—Network Tools 838
-Z. _
.
-mmmmmmmm^
I-
—
£)Ntnrintt»kM ;
1DN«» UiMtMH »% HI
UMrtwnllxfe 11tv It
&aNrtiral$rturtv |!T. 11
T<rt,l IUH lf»
24 Networking Fundamentals
Domain 5.0—Practice Exam Questions 79-89 838
Domain 6.0—Network Security 840
Domain 6.0—Practice Exam Questions 90-100 840
Scoring the Exam 842
Chapter 21
Employment in the Field of Networking Technology 845
Information Technology Industry Careers 847
Network Support Specialist 848
Network Administrator 849
Systems Analyst 849
Consultant 849
Technical Salesperson 849
Web Administrator 850
Programmer 850
Engineer 851
Entrepreneur 851
Career Information Sources 851
General and College Education 853
Certification 854
CompTIA Certifications 854
Microsoft Certifications 856
Novell Certifications 857
Cisco Certifications and Training 858
LPIC 859
Other Certifications 859
Employment 860
Job Search Ideas 861
Preparing a Resume 861
Preparing for the Interview 862
Personal Appearance at the Interview 863
Information to Bring to an Interview 863
The Job Interview 864
Testing at the Interview 865
Appendix A—List of Networking Acronyms 867
Appendix B—Binary Math 873
Appendix C—Number Conversion Table 877
Appendix D—Table of ASCII Characters 879
Appendix E—Protocol Family Encapsulations 881
Glossary 883
Index 909